After baking the flour, azodicarbonamide, an approved food additive, can be converted into carcinogenic semicarbazide hydrochloride (SEM) and biurea in flour products. Thus, determine SEM in commercial bread products is become mandatory and need to be performed. Therefore, two accurate, precision, simple and economics colorimetric methods have been developed for the visual detection and quantitative determination of SEM in commercial flour products. The 1st method is based on the formation of a blue-coloured product with λmax at 690 nm as a result of a reaction between the SEM and potassium ferrocyanide in an acidic medium (pH 6.0). In the 2nd method, a brownish-green colored product is formed due to the reaction between the SEM and phosphomolybdic acid (PMA) in a basic medium (pH 9.0). The resulting product absorbs light at λmax 750 nm. The colorimetric methods can be used either as sensors to detect the SEM by bare eye observation as little as 10 ppm and 2.0 ppm within 4−2 min or by spectrophotometry as the determination methods with linearity ranges 8.0−180 ppm and 0.5−30 ppm for the 1st and 2nd methods respectively. The developed methods were successfully applied to determine the SEM in the commercial bread products with a relative standard deviation (RSD) <3 %, <2 % and recovery of 94–103 %, 96–101 % for methods (1st and 2nd) respectively. The visual detection limits of the sensors can be used as a platform for SEM field-portable detection due to their lower limitations than the reported SEM in flour products, which opens the doors for on-site detection of SEM with instrument free.
Background: In young adults, multiple sclerosis is a prevalent chronic inflammatory demyelinating condition. It is characterized by white matter affection, but many individuals also have significant gray matter involvement. A double-inversion recovery pulse (DIR) pattern was recently proposed to improve the visibility of multiple sclerosis lesions. Objective: To find out how well a DIR sequence, FLAIR, and T2-weighted pulse sequences can find MS lesions in the supratentorial and infratentorial regions. Methods: A total of 37 patients with established diagnoses of multiple sclerosis were included in this cross-sectional study. Brain MRI was done using double inversion recovery, T2, and FLAIR sequences. The number of lesions was count
... Show MoreInternational companies are striving to reduce their costs and increase their profits, and these trends have produced many methods and techniques to achieve these goals. these methods is heuristic and the other Optimization.. The research includes an attempt to adapt some of these techniques in the Iraqi companies, and these techniques are to determine the optimal lot size using the algorithms Wagner-Whitin under the theory of constraints. The research adopted the case study methodology to objectively identify the problem of research, namely determining lot size optimal for each of the products of electronic measurement laboratory in Diyala and in light of the bottlenecks in w
... Show MoreA simple, rapid, accurate and sensitive spectrophotometric method has been developed for the determing carbamate pesticides in both pure and water samples. The method is appropriate for the determination of carbofuran in the presence of other ingredients that are usually available in dosage forms. The effect of organic solvents on the spectrophotometric properties of the azo dye and the structure of the resulting product have also been worked out and it is found to be 1:1 benzidine :carbofuran. The method can be successfully applied to determination of carbofuran in water samples. The method is based on diazotization of Benzidine (4, 4 – diamino biphenyl) with sodium nitrite and hydrochloric acid followed by coupling with carbofuran
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreThe toxicological risks and lifetime cancer risks associated with exposure to disinfection by-products (DBPs) including Halloacetic acids (HAAs) and trihalomethanes (THMs) compounds by drinking water in several districts in Wassit Province were estimated. The seasonal variation of HAAs and THMs compounds in drinking water have indicated that the mean values for total HAAs (THAAs) and total THMs (TTHMs) ranged from 43.2 to 72.4 mg/l and from 40 to 115.5 mg/l, respectively. The World health organization index for additive toxicity approach was non-compliant with the WHO guideline value in summer and autumn seasons and this means that THMs concentration has adverse toxic health effects. The multi-pathway of lifetime hu
... Show MoreObjective: To determine the ability of uVDBP to discern SRNS from steroid-sensitive nephrotic syndrome (SSNS) in Iraqi children. Materials and Methods: This cross-sectional study enrolled children with SRNS (n=31) and SSNS (n=32) from the pediatric nephrology clinic of Babylon Hospital for Maternity and Pediatrics over three months. Patients' characteristics in terms of demographics, clinical data, and urinary investigations were collected. Quantitative analysis of uVDBP levels was undertaken via a commercially available ELISA kit. Results: The median uVDBP values were significantly higher (p-value<0.001) in the SRNS group (median=10.26, IQR=5.91 μg/mL) than in the SSNS group (median=0.953, IQR=4.12 μg/mL). A negative correlati
... Show MoreThe aim of this study was to identify the effectiveness of using generative learning model in learning kinetic series on rings and horizontal bar in artistic gymnastics for men ,Also, the two groups were better in learning the two series of movements on the rings and horizontal bar . The experimental method was used to design two parallel groups with pretested and posttest .The sample included third graders at the College of Physical Education and Sports Sciences - University of Baghdad ,The third class (d) was chosen to represent the control group that applied the curriculum in the college, with (12) students per group. After conducting the tribal tests, the main experiment was carried out for (8) weeks at the rate of two units per week di
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show More